Analysis

  • max time kernel
    3s
  • max time network
    4s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01-01-2024 12:26

General

  • Target

    f7f85240efa2ebe980a83df6c3d834699703ba1c3c5f38ec58687aba219a0c03.exe

  • Size

    2.4MB

  • MD5

    18ad51c411e955400dfda2e1ec290d25

  • SHA1

    f5a896e93f0c068441bbf2d76fd44571a61869b8

  • SHA256

    f7f85240efa2ebe980a83df6c3d834699703ba1c3c5f38ec58687aba219a0c03

  • SHA512

    6a5315f66dec6f8a790c2aa39f656170fcd4c6507f0364cc949c97af41439b4fb1d6f4f131e513b00c06ac6a17906b9cbced8db1c57fe800ed0955b10d928a9f

  • SSDEEP

    49152:j5t2anwKeCP+0NevGW/9WVttBfZir9TXpbyGu9LgBg6cuquAbyJKfHYAMHz5kURY:72anw5CP+eeR1MtPZiZTXp+Gu9Lr6cu8

Score
10/10

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\HOW TO RESTORE YOUR FILES.TXT

Ransom Note
Dear Management of Dellner Couplers AB! We inform you that your network has undergone a penetration test, during which we encrypted your files and downloaded more than 240 GB of your and your customers data, including: Confidentional documents Copy of some mailboxes Accounting Databases backups Marketing data We understand that if this information gets to your clients or to media directly, it will cause reputational and financial damage to your business, which we wouldn't want, therefore, for our part, we guarantee that information about what happened will not get into the media (but we cannot guarantee this if you decide to turn to third-party companies for help or ignore this message). Important! Do not try to decrypt the files yourself or using third-party utilities. The only program that can decrypt them is our decryptor, which you can request from the contacts below. Any other program will only damage files in such a way that it will be impossible to restore them. You can get all the necessary evidence, discuss with us possible solutions to this problem and request a decryptor by using the contacts below. Please be advised that if we don't receive a response from you within 3 days, we reserve the right to publish files to the public. Contact me: [email protected] or [email protected] Additional ways to communicate in tox chat https://tox.chat/ contact our tox id: 5BF6FF6E9633FDCF1441BF271CBE5DAE1B6B027FA5B85A6EE5704E8B7FEC8E50A323CD66F7D2
URLs

https://tox.chat/

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7f85240efa2ebe980a83df6c3d834699703ba1c3c5f38ec58687aba219a0c03.exe
    "C:\Users\Admin\AppData\Local\Temp\f7f85240efa2ebe980a83df6c3d834699703ba1c3c5f38ec58687aba219a0c03.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Windows\system32\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\udixfgfcbkeuulmutpi.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2088
      • C:\Windows\system32\findstr.exe
        FINDSTR SERVICE_NAME
        3⤵
          PID:2216
        • C:\Windows\system32\sc.exe
          SC QUERY
          3⤵
          • Launches sc.exe
          PID:2184
      • C:\Windows\system32\cmd.exe
        cmd /c C:\Users\Admin\AppData\Local\Temp\faewrcdcms.bat
        2⤵
          PID:2356

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\HOW TO RESTORE YOUR FILES.TXT

        Filesize

        1KB

        MD5

        d86e48998794d109ead31f0ec7b29c19

        SHA1

        082f997700a11b25da10e2c0518662d3df373868

        SHA256

        65dc3a571261f093469b6770fad26d1df9ff69d05941cd61b3250d18b9160897

        SHA512

        9f3b0d82d5b166a532f0fe949f999eca2494d954560c1ee451057e521a3cec7ddad3a55febbf21bc65c86822c5af97e12169eb2489c370172e03fb1bc1325bb3

      • C:\Users\Admin\AppData\Local\Temp\faewrcdcms.bat

        Filesize

        47B

        MD5

        2202e846ba05d7f0bb20adbc5249c359

        SHA1

        4115d2d15614503456aea14db61d71a756cc7b8c

        SHA256

        0965cb8ee38adedd9ba06bdad9220a35890c2df0e4c78d0559cd6da653bf740f

        SHA512

        cd6ce6d89a8e5f75724405bc2694b706819c3c554b042075d5eb47fdb75653235160ac8a85e7425a49d98f25b3886faaaec5599bcf66d20bf6115dc3af4ba9c7

      • C:\Users\Admin\AppData\Local\Temp\udixfgfcbkeuulmutpi.bat

        Filesize

        43B

        MD5

        55310bb774fff38cca265dbc70ad6705

        SHA1

        cb8d76e9fd38a0b253056e5f204dab5441fe932b

        SHA256

        1fbdb97893d09d59575c3ef95df3c929fe6b6ddf1b273283e4efadf94cdc802d

        SHA512

        40e5a5e8454ca3eaac36d732550e2c5d869a235e3bbc4d31c4afa038fe4e06f782fa0885e876ad8119be766477fdcc12c1d5d04d53cf6b324e366b5351fc7cd4

      • memory/1720-0-0x0000000000800000-0x0000000000CB6000-memory.dmp

        Filesize

        4.7MB